Two six technologies

Lead Vulnerability Researcher

Dayton, Ohio Full Time

At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future.

Overview of Opportunity:

Two Six Technologies is seeking a Lead Vulnerability Researcher to spearhead our vulnerability research initiatives in Dayton, Ohio. In this leadership role, you are more than a technical expert; you are a strategist and mentor who defines research methodologies and solves our most complex wireless and embedded system challenges.

You will bridge the gap between high-level mission requirements and deep-dive technical execution. As a Lead, you will drive innovation within our Wireless Sector, ensuring our team remains at the forefront of the industry while serving as a primary technical point of contact for mission-critical government programs.

What You Will Do

  • Lead the execution of large-scale vulnerability research projects, ensuring high-quality results and innovative approaches.
  • Architect research strategies for complex, undocumented, or highly resilient embedded and wireless systems.
  • Grow the technical capabilities of the team by mentoring junior and staff researchers through code reviews and knowledge sharing.
  • Interface directly with customers to translate mission needs into technical requirements and present complex research findings.
  • Identify and implement new tools, automation, or methodologies (IR&D) to improve the team's research efficiency and capabilities.

What You Will Need (Basic Qualifications)

  • Bachelor’s Degree in Electrical Engineering, Computer Engineering, Computer Science, or a related field.
  • Extensive experience in vulnerability research, reverse engineering, or CNO development.
  • Expert-level proficiency in modern decompilers (Ghidra, IDA Pro, or Binary Ninja).
  • Advanced knowledge of assembly languages (x86, ARM, MIPS, etc.) and OS internals.
  • Knowledge of common network protocols TCP/IP, UDP, or HTTP 
  • Proficiency with at least one modern debugger such as GDB or WinDBG
  • Proven track record of discovering vulnerabilities in complex systems or developing sophisticated exploits.
  • Experience in a technical leadership or project lead capacity.
  • Security Clearance: Active US Secret-level clearance with the ability to obtain and maintain TS/SCI.

Nice to Have (Preferred)

  • Experience assisting in technical writing for RFPs, white papers, or grant proposals to secure new research funding.
  • Mastery of defeating modern mitigations (ASLR, DEP, CFG) on non-standard architectures.
  • Deep knowledge of cellular standards (4G/5G) or low-bandwidth communications (CAN bus, RS485).
  • History of published research, conference presentations (DEF CON, Black Hat), or CVE credits.
  • Previous experience in a client-facing technical lead role for government contracts.

#LI-ZS1

#LI-HYBRID

 

Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development.

The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements.

Salary Range
$117,235$201,205 USD